CVE-2017-9269

In libzypp before August 2018 GPG keys attached to YUM repositories were not correctly pinned, allowing malicious repository mirrors to silently downgrade to unsigned repositories with potential malicious content.
Configurations

Configuration 1 (hide)

cpe:2.3:a:opensuse:libzypp:-:*:*:*:*:*:*:*

History

07 Nov 2023, 02:50

Type Values Removed Values Added
References (SUSE) https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html - Vendor Advisory () https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html -
References (CONFIRM) https://bugzilla.suse.com/show_bug.cgi?id=1045735 - Issue Tracking () https://bugzilla.suse.com/show_bug.cgi?id=1045735 -
References (CONFIRM) https://www.suse.com/de-de/security/cve/CVE-2017-9269/ - Vendor Advisory () https://www.suse.com/de-de/security/cve/CVE-2017-9269/ -

Information

Published : 2018-03-01 20:29

Updated : 2024-02-28 16:25


NVD link : CVE-2017-9269

Mitre link : CVE-2017-9269

CVE.ORG link : CVE-2017-9269


JSON object : View

Products Affected

opensuse

  • libzypp
CWE
CWE-20

Improper Input Validation

CWE-757

Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade')